National Repository of Grey Literature 51 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Graphical Interface for the NetLoiter
Ščupák, Marian ; Smrčka, Aleš (referee) ; Rozsíval, Michal (advisor)
The aim of this work is to create a graphical user interface that simplifies working with the NetLoiter tool. The chosen form for implementing the user interface is a web application. The created user interface allows the user to fill out forms, which validate their input and convert it into configuration files. The generated configurations can be used to run the NetLoiter tool via the SSH protocol and subsequently monitor the output in a user-friendly manner in real-time. The interface also provides users with the ability to perform basic statistical analyses on the data generated by the NetLoiter tool. The result of the work is increased efficiency in managing the NetLoiter tool and easier interpretation of its outputs.
Automated Detection of Malware Activity on Local Networks
Pap, Adam ; Regéciová, Dominika (referee) ; Ryšavý, Ondřej (advisor)
The aim of this work is to analyze the network communication of malware and then identify suitable significant features that would allow to develop a suitable method for its detection. As part of the solution of the thesis, a dataset was created from which an IoC for each malware family were extracted. These IoCs were then validated through the AlienVault OTX platform, in order to verify their relevance. Metrics such as false positive rate, accuracy and sensitivity were used for evaluation. On the test data, the two IoC models created from the datasets achieved an accuracy of 99.337% and 94.732% for dataset 1 and 2, respectively. The IoC models of dataset No. 1 falsely classified 3.03% of communication windows as malicious in real communication. IoC models of set No. 2 classified 5.66% as malicious. After the samples of different malware families were run on the machine, the IoC models of set No. 1 classified 7.14% of the windows as malicious. Set No. 2 models classified 15.79%.
Network Game: Destroy the Submarine
Jašek, Petr ; Mlích, Jozef (referee) ; Szőke, Igor (advisor)
This Bachelor's Thesis describes development of a simple network computer game. This thesis describes basic scheme of computer game development. Also an analysis of various implementation of network is made in this thesis. The output of this work is a computer program written in the C++ language. For implementation of the network the Boost 1.50.0 library was used. Network communication was implemented as client-server architecture with usage of the UDP protocol. For implementation of graphics and sound, the Allegro 5.0.7 library was used.
Design and Creation of Proxy for Penetration Testing
Válka, Michal ; Bláha, Lukáš (referee) ; Dydowicz, Petr (advisor)
This bachelor’s thesis is aimed at design and development of proxy for penetration testing. The thesis is divided into three main parts and begins with a theoretical part, which is focused on fundamental technologies and principles on which the application is based. The second part is focused on comparison of currently available solutions. The third part contains the creation of the proxy itself. The last chapter contains a summary of this thesis and the benefits of the developed product for penetration testing.
iPhone as a Universal PC Input Device
Mataj, Lukáš ; Řezníček, Ivo (referee) ; Ševcovic, Jiří (advisor)
This bachelor thesis is concerned with making of an application, which enables to use mobile appliance iPhone as a wirelles universal input device of a computer. With this application we can simulate a keyboard, a numeric keyboard, a computer mouse, a touchpad and a game controller. We also shortly introduce an appliance iPhone and we get acquainted with the process of application development for this platform.
Network Protocol Analyzer
Hlísta, Juraj ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
Bachelor's thesis is concerned with methods of protocol detection at seventh layer of ISO/OSI network model. It focuses on proposal and implementation of a system which is able to identify aplication protocols from packet's data field. This part of packet contains signatures that the analyzer searches for using regular expressions. The application was written in C programming language using libpcap library that provides API for capturing network communication.
XMPP protocol Jabber features and its utilization for multimedia transmission
Havlena, Petr ; Průša, Zdeněk (referee) ; Šmirg, Ondřej (advisor)
Master’s thesis is trying to create opensource IM application for communication in Jabber network. In nowadays it is getting more and more popularity as at providers, so mainly at end users. In first half of thesis are explained basics of whole issues and in second half is described resulting application, which has been created by using of object oriented programming language Java. Java is very extended between programmers for her simplicity and great support. Thanks this is available a many external libraries and extensions. Application has been written on Smack library in version 3.04 and VoIP module on JMF (Java Media Framework). Graphic interface has been created by using of standard Java visual components (javax.swing).
Advanced proxy for penetration testing
Válka, Michal ; Vilém,, Šlesinger (referee) ; Sedlák, Petr (advisor)
This master’s thesis focuses on improving the open-source proxy tool for penetration testing of thick clients. The thesis is divided into three main chapters, the first of which is focused on the theoretical background on which the thesis is based. The second chapter describes the analysis of the current state and defines user requirements, which must be met. The third chapter deals with increasing the quality and expanding the functionality based on user requirements. At the same time, a testing methodology is created and a vulnerable application is developed as a teaching material for the methodology. The chapter concludes with a summary of the economic costs and benefits of the application for the penetration testing process.
Acquisition of data on network communication from terminal devices
Obršlík, Lukáš ; Šedý, Jakub (referee) ; Krkoš, Radko (advisor)
The bachelor’s thesis deals with collecting statistical information about network communication in terminal equipment devices. Theoretical part of this project aims to gather methods and application tools on Windows and Unix platforms and support them by well chosen third party solution to gain more detailed informations. Tools were chosen based on ease of deployment and usage. Practical part of bachelor’s thesis directs to find suitable solution to gather detailed informations about network traffic. Important fact must be to not bother the end-users. Next part is to develop own application for collecting information about network usage and communication. Output format structure of the solution was designed with future data manipulation in mind.
Identifying P2P Users Using Traffic Analysis
Jalsovszky, Zoltán ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
Bachelor's thesis deals with methods of detection of P2P users like BitTorrent, DC++, Gnutella and others. An application was created, which is able to detect these users using multiple ways. This method combines analysis of packet payload and analysis of network traffic and flows, so more exact detection is possible. Application is written in C++ programming language, and is built on open-source tool L7-filter.

National Repository of Grey Literature : 51 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.